Annotation of src/usr.bin/tcpbench/tcpbench.c, Revision 1.24
1.1 djm 1: /*
2: * Copyright (c) 2008 Damien Miller <djm@mindrot.org>
1.20 claudio 3: * Copyright (c) 2011 Christiano F. Haesbaert <haesbaert@haesbaert.org>
1.1 djm 4: *
5: * Permission to use, copy, modify, and distribute this software for any
6: * purpose with or without fee is hereby granted, provided that the above
7: * copyright notice and this permission notice appear in all copies.
8: *
9: * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
10: * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
11: * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
12: * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
13: * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
14: * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
15: * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16: */
17:
18: #include <sys/types.h>
19: #include <sys/time.h>
20: #include <sys/socket.h>
21: #include <sys/socketvar.h>
1.11 claudio 22: #include <sys/resource.h>
1.20 claudio 23: #include <sys/queue.h>
1.1 djm 24:
25: #include <net/route.h>
26:
27: #include <netinet/in.h>
28: #include <netinet/in_systm.h>
29: #include <netinet/ip.h>
30: #include <netinet/tcp.h>
31: #include <netinet/tcp_timer.h>
32: #include <netinet/tcp_fsm.h>
33: #include <netinet/in_pcb.h>
34: #include <netinet/tcp_var.h>
35:
36: #include <arpa/inet.h>
37:
38: #include <unistd.h>
39: #include <limits.h>
40: #include <stdlib.h>
41: #include <stdio.h>
42: #include <string.h>
43: #include <errno.h>
1.20 claudio 44: #include <event.h>
1.1 djm 45: #include <netdb.h>
46: #include <signal.h>
47: #include <err.h>
48: #include <fcntl.h>
49: #include <poll.h>
50:
51: #include <kvm.h>
52: #include <nlist.h>
53:
1.11 claudio 54: #define DEFAULT_PORT "12345"
55: #define DEFAULT_STATS_INTERVAL 1000 /* ms */
1.20 claudio 56: #define DEFAULT_BUF (256 * 1024)
57: #define DEFAULT_UDP_PKT (1500 - 28) /* TODO don't hardcode this */
58: #define TCP_MODE !ptb->uflag
59: #define UDP_MODE ptb->uflag
1.11 claudio 60: #define MAX_FD 1024
1.1 djm 61:
1.20 claudio 62: /* Our tcpbench globals */
63: struct {
64: u_int Vflag; /* rtableid */
65: int Sflag; /* Socket buffer size (tcp mode) */
66: u_int rflag; /* Report rate (ms) */
67: int sflag; /* True if server */
1.24 ! haesbaer 68: int Tflag; /* ToS if != -1 */
1.20 claudio 69: int vflag; /* Verbose */
70: int uflag; /* UDP mode */
71: kvm_t *kvmh; /* Kvm handler */
72: char **kvars; /* Kvm enabled vars */
73: u_long ktcbtab; /* Ktcb */
74: char *dummybuf; /* IO buffer */
75: size_t dummybuf_len; /* IO buffer len */
76: } tcpbench, *ptb;
1.1 djm 77:
1.20 claudio 78: /* stats for a single tcp connection, udp uses only one */
1.1 djm 79: struct statctx {
1.20 claudio 80: TAILQ_ENTRY(statctx) entry;
1.11 claudio 81: struct timeval t_start, t_last;
1.1 djm 82: unsigned long long bytes;
1.20 claudio 83: int fd;
84: char *buf;
85: size_t buflen;
86: struct event ev;
87: /* TCP only */
88: u_long tcp_tcbaddr;
89: /* UDP only */
90: u_long udp_slice_pkts;
1.1 djm 91: };
92:
1.20 claudio 93: static void signal_handler(int, short, void *);
94: static void saddr_ntop(const struct sockaddr *, socklen_t, char *, size_t);
95: static void drop_gid(void);
96: static void set_slice_timer(int);
97: static void print_tcp_header(void);
98: static void kget(u_long, void *, size_t);
99: static u_long kfind_tcb(int);
100: static void kupdate_stats(u_long, struct inpcb *, struct tcpcb *,
101: struct socket *);
102: static void list_kvars(void);
103: static void check_kvar(const char *);
104: static char ** check_prepare_kvars(char *);
105: static void stats_prepare(struct statctx *);
106: static void tcp_stats_display(unsigned long long, long double, float,
107: struct statctx *, struct inpcb *, struct tcpcb *, struct socket *);
108: static void tcp_process_slice(int, short, void *);
109: static void tcp_server_handle_sc(int, short, void *);
110: static void tcp_server_accept(int, short, void *);
111: static void server_init(struct addrinfo *, struct statctx *);
112: static void client_handle_sc(int, short, void *);
113: static void client_init(struct addrinfo *, int, struct statctx *);
114: static int clock_gettime_tv(clockid_t, struct timeval *);
115: static void udp_server_handle_sc(int, short, void *);
116: static void udp_process_slice(int, short, void *);
1.24 ! haesbaer 117: static int map_tos(char *, int *);
1.11 claudio 118: /*
119: * We account the mainstats here, that is the stats
120: * for all connections, all variables starting with slice
121: * are used to account information for the timeslice
122: * between each output. Peak variables record the highest
123: * between all slices so far.
124: */
125: static struct {
126: unsigned long long slice_bytes; /* bytes for last slice */
127: long double peak_mbps; /* peak mbps so far */
128: int nconns; /* connected clients */
1.20 claudio 129: struct event timer; /* process timer */
1.11 claudio 130: } mainstats;
131:
1.20 claudio 132: /* When adding variables, also add to tcp_stats_display() */
1.1 djm 133: static const char *allowed_kvars[] = {
134: "inpcb.inp_flags",
135: "sockb.so_rcv.sb_cc",
1.19 claudio 136: "sockb.so_rcv.sb_wat",
1.1 djm 137: "sockb.so_rcv.sb_hiwat",
138: "sockb.so_snd.sb_cc",
1.19 claudio 139: "sockb.so_snd.sb_wat",
1.1 djm 140: "sockb.so_snd.sb_hiwat",
141: "tcpcb.snd_una",
142: "tcpcb.snd_nxt",
143: "tcpcb.snd_wl1",
144: "tcpcb.snd_wl2",
145: "tcpcb.snd_wnd",
146: "tcpcb.rcv_wnd",
147: "tcpcb.rcv_nxt",
148: "tcpcb.rcv_adv",
149: "tcpcb.snd_max",
150: "tcpcb.snd_cwnd",
151: "tcpcb.snd_ssthresh",
152: "tcpcb.t_rcvtime",
153: "tcpcb.t_rtttime",
154: "tcpcb.t_rtseq",
155: "tcpcb.t_srtt",
156: "tcpcb.t_rttvar",
157: "tcpcb.t_rttmin",
158: "tcpcb.max_sndwnd",
159: "tcpcb.snd_scale",
160: "tcpcb.rcv_scale",
161: "tcpcb.last_ack_sent",
1.19 claudio 162: "tcpcb.rfbuf_cnt",
163: "tcpcb.rfbuf_ts",
164: "tcpcb.ts_recent_age",
165: "tcpcb.ts_recent",
1.1 djm 166: NULL
167: };
168:
1.20 claudio 169: TAILQ_HEAD(, statctx) sc_queue;
1.1 djm 170:
171: static void __dead
172: usage(void)
173: {
174: fprintf(stderr,
1.6 jmc 175: "usage: tcpbench -l\n"
1.21 jmc 176: " tcpbench [-uv] [-B buf] [-k kvars] [-n connections] [-p port]\n"
1.24 ! haesbaer 177: " [-r interval] [-S space] [-T toskeyword] [-V rtable]\n"
! 178: " hostname\n"
1.21 jmc 179: " tcpbench -s [-uv] [-B buf] [-k kvars] [-p port]\n"
1.24 ! haesbaer 180: " [-r interval] [-S space] [-T toskeyword] [-V rtable]\n");
1.1 djm 181: exit(1);
182: }
183:
184: static void
1.20 claudio 185: signal_handler(int sig, short event, void *bula)
186: {
187: /*
188: * signal handler rules don't apply, libevent decouples for us
189: */
190: switch (sig) {
191: case SIGINT:
192: case SIGTERM:
193: case SIGHUP:
194: warnx("Terminated by signal %d", sig);
195: exit(0);
196: break; /* NOTREACHED */
197: default:
198: errx(1, "unexpected signal %d", sig);
199: break; /* NOTREACHED */
200: }
201: }
202:
203: static void
1.1 djm 204: saddr_ntop(const struct sockaddr *addr, socklen_t alen, char *buf, size_t len)
205: {
206: char hbuf[NI_MAXHOST], pbuf[NI_MAXSERV];
207: int herr;
208:
1.3 djm 209: if ((herr = getnameinfo(addr, alen, hbuf, sizeof(hbuf),
210: pbuf, sizeof(pbuf), NI_NUMERICHOST|NI_NUMERICSERV)) != 0) {
1.1 djm 211: if (herr == EAI_SYSTEM)
212: err(1, "getnameinfo");
213: else
214: errx(1, "getnameinfo: %s", gai_strerror(herr));
215: }
216: snprintf(buf, len, "[%s]:%s", hbuf, pbuf);
217: }
218:
219: static void
1.20 claudio 220: drop_gid(void)
221: {
222: gid_t gid;
223:
224: gid = getgid();
225: if (setresgid(gid, gid, gid) == -1)
226: err(1, "setresgid");
227: }
228:
229: static void
230: set_slice_timer(int on)
1.11 claudio 231: {
1.20 claudio 232: struct timeval tv;
1.11 claudio 233:
1.20 claudio 234: if (ptb->rflag == 0)
1.11 claudio 235: return;
236:
1.20 claudio 237: if (on) {
238: if (evtimer_pending(&mainstats.timer, NULL))
239: return;
240: timerclear(&tv);
241: /* XXX Is there a better way to do this ? */
242: tv.tv_sec = ptb->rflag / 1000;
243: tv.tv_usec = (ptb->rflag % 1000) * 1000;
244:
245: evtimer_add(&mainstats.timer, &tv);
246: } else if (evtimer_pending(&mainstats.timer, NULL))
247: evtimer_del(&mainstats.timer);
248: }
1.11 claudio 249:
1.20 claudio 250: static int
251: clock_gettime_tv(clockid_t clock_id, struct timeval *tv)
252: {
253: struct timespec ts;
254:
255: if (clock_gettime(clock_id, &ts) == -1)
256: return (-1);
257:
258: TIMESPEC_TO_TIMEVAL(tv, &ts);
259:
260: return (0);
1.11 claudio 261: }
262:
263: static void
1.20 claudio 264: print_tcp_header(void)
1.11 claudio 265: {
266: char **kv;
1.20 claudio 267:
1.11 claudio 268: printf("%12s %14s %12s %8s ", "elapsed_ms", "bytes", "mbps",
269: "bwidth");
1.20 claudio 270: for (kv = ptb->kvars; ptb->kvars != NULL && *kv != NULL; kv++)
271: printf("%s%s", kv != ptb->kvars ? "," : "", *kv);
1.11 claudio 272: printf("\n");
273: }
274:
275: static void
1.20 claudio 276: kget(u_long addr, void *buf, size_t size)
1.1 djm 277: {
1.20 claudio 278: if (kvm_read(ptb->kvmh, addr, buf, size) != (ssize_t)size)
279: errx(1, "kvm_read: %s", kvm_geterr(ptb->kvmh));
1.1 djm 280: }
281:
282: static u_long
1.20 claudio 283: kfind_tcb(int sock)
1.1 djm 284: {
285: struct inpcbtable tcbtab;
286: struct inpcb *head, *next, *prev;
287: struct inpcb inpcb;
288: struct tcpcb tcpcb;
289:
290: struct sockaddr_storage me, them;
291: socklen_t melen, themlen;
292: struct sockaddr_in *in4;
293: struct sockaddr_in6 *in6;
294: char tmp1[64], tmp2[64];
1.11 claudio 295: int nretry;
1.1 djm 296:
1.11 claudio 297: nretry = 10;
1.1 djm 298: melen = themlen = sizeof(struct sockaddr_storage);
299: if (getsockname(sock, (struct sockaddr *)&me, &melen) == -1)
300: err(1, "getsockname");
301: if (getpeername(sock, (struct sockaddr *)&them, &themlen) == -1)
302: err(1, "getpeername");
303: if (me.ss_family != them.ss_family)
304: errx(1, "%s: me.ss_family != them.ss_family", __func__);
305: if (me.ss_family != AF_INET && me.ss_family != AF_INET6)
306: errx(1, "%s: unknown socket family", __func__);
1.20 claudio 307: if (ptb->vflag >= 2) {
1.1 djm 308: saddr_ntop((struct sockaddr *)&me, me.ss_len,
309: tmp1, sizeof(tmp1));
310: saddr_ntop((struct sockaddr *)&them, them.ss_len,
311: tmp2, sizeof(tmp2));
312: fprintf(stderr, "Our socket local %s remote %s\n", tmp1, tmp2);
313: }
1.20 claudio 314: if (ptb->vflag >= 2)
315: fprintf(stderr, "Using PCB table at %lu\n", ptb->ktcbtab);
1.11 claudio 316: retry:
1.20 claudio 317: kget(ptb->ktcbtab, &tcbtab, sizeof(tcbtab));
1.1 djm 318: prev = head = (struct inpcb *)&CIRCLEQ_FIRST(
1.20 claudio 319: &((struct inpcbtable *)ptb->ktcbtab)->inpt_queue);
1.1 djm 320: next = CIRCLEQ_FIRST(&tcbtab.inpt_queue);
321:
1.20 claudio 322: if (ptb->vflag >= 2)
1.1 djm 323: fprintf(stderr, "PCB head at %p\n", head);
324: while (next != head) {
1.20 claudio 325: if (ptb->vflag >= 2)
1.1 djm 326: fprintf(stderr, "Checking PCB %p\n", next);
1.20 claudio 327: kget((u_long)next, &inpcb, sizeof(inpcb));
1.11 claudio 328: if (CIRCLEQ_PREV(&inpcb, inp_queue) != prev) {
329: if (nretry--) {
330: warnx("pcb prev pointer insane");
331: goto retry;
332: }
333: else
334: errx(1, "pcb prev pointer insane,"
335: " all attempts exausted");
336: }
1.1 djm 337: prev = next;
338: next = CIRCLEQ_NEXT(&inpcb, inp_queue);
339:
340: if (me.ss_family == AF_INET) {
341: if ((inpcb.inp_flags & INP_IPV6) != 0) {
1.20 claudio 342: if (ptb->vflag >= 2)
1.1 djm 343: fprintf(stderr, "Skip: INP_IPV6");
344: continue;
345: }
1.20 claudio 346: if (ptb->vflag >= 2) {
1.1 djm 347: inet_ntop(AF_INET, &inpcb.inp_laddr,
348: tmp1, sizeof(tmp1));
349: inet_ntop(AF_INET, &inpcb.inp_faddr,
350: tmp2, sizeof(tmp2));
351: fprintf(stderr, "PCB %p local: [%s]:%d "
352: "remote: [%s]:%d\n", prev,
353: tmp1, inpcb.inp_lport,
354: tmp2, inpcb.inp_fport);
355: }
356: in4 = (struct sockaddr_in *)&me;
357: if (memcmp(&in4->sin_addr, &inpcb.inp_laddr,
358: sizeof(struct in_addr)) != 0 ||
359: in4->sin_port != inpcb.inp_lport)
360: continue;
361: in4 = (struct sockaddr_in *)&them;
362: if (memcmp(&in4->sin_addr, &inpcb.inp_faddr,
363: sizeof(struct in_addr)) != 0 ||
364: in4->sin_port != inpcb.inp_fport)
365: continue;
366: } else {
367: if ((inpcb.inp_flags & INP_IPV6) == 0)
368: continue;
1.20 claudio 369: if (ptb->vflag >= 2) {
1.1 djm 370: inet_ntop(AF_INET6, &inpcb.inp_laddr6,
371: tmp1, sizeof(tmp1));
372: inet_ntop(AF_INET6, &inpcb.inp_faddr6,
373: tmp2, sizeof(tmp2));
374: fprintf(stderr, "PCB %p local: [%s]:%d "
375: "remote: [%s]:%d\n", prev,
376: tmp1, inpcb.inp_lport,
377: tmp2, inpcb.inp_fport);
378: }
379: in6 = (struct sockaddr_in6 *)&me;
380: if (memcmp(&in6->sin6_addr, &inpcb.inp_laddr6,
381: sizeof(struct in6_addr)) != 0 ||
382: in6->sin6_port != inpcb.inp_lport)
383: continue;
384: in6 = (struct sockaddr_in6 *)&them;
385: if (memcmp(&in6->sin6_addr, &inpcb.inp_faddr6,
386: sizeof(struct in6_addr)) != 0 ||
387: in6->sin6_port != inpcb.inp_fport)
388: continue;
389: }
1.20 claudio 390: kget((u_long)inpcb.inp_ppcb, &tcpcb, sizeof(tcpcb));
1.1 djm 391: if (tcpcb.t_state != TCPS_ESTABLISHED) {
1.20 claudio 392: if (ptb->vflag >= 2)
1.1 djm 393: fprintf(stderr, "Not established\n");
394: continue;
395: }
1.20 claudio 396: if (ptb->vflag >= 2)
1.1 djm 397: fprintf(stderr, "Found PCB at %p\n", prev);
1.20 claudio 398: return ((u_long)prev);
1.1 djm 399: }
400:
401: errx(1, "No matching PCB found");
402: }
403:
404: static void
1.20 claudio 405: kupdate_stats(u_long tcbaddr, struct inpcb *inpcb,
406: struct tcpcb *tcpcb, struct socket *sockb)
1.1 djm 407: {
1.20 claudio 408: kget(tcbaddr, inpcb, sizeof(*inpcb));
409: kget((u_long)inpcb->inp_ppcb, tcpcb, sizeof(*tcpcb));
410: kget((u_long)inpcb->inp_socket, sockb, sizeof(*sockb));
1.1 djm 411: }
412:
413: static void
414: check_kvar(const char *var)
415: {
1.16 deraadt 416: u_int i;
1.1 djm 417:
418: for (i = 0; allowed_kvars[i] != NULL; i++)
419: if (strcmp(allowed_kvars[i], var) == 0)
420: return;
421: errx(1, "Unrecognised kvar: %s", var);
422: }
423:
424: static void
425: list_kvars(void)
426: {
1.16 deraadt 427: u_int i;
1.1 djm 428:
429: fprintf(stderr, "Supported kernel variables:\n");
430: for (i = 0; allowed_kvars[i] != NULL; i++)
431: fprintf(stderr, "\t%s\n", allowed_kvars[i]);
432: }
433:
434: static char **
435: check_prepare_kvars(char *list)
436: {
437: char *item, **ret = NULL;
1.16 deraadt 438: u_int n = 0;
1.1 djm 439:
440: while ((item = strsep(&list, ", \t\n")) != NULL) {
441: check_kvar(item);
442: if ((ret = realloc(ret, sizeof(*ret) * (++n + 1))) == NULL)
443: errx(1, "realloc(kvars)");
444: if ((ret[n - 1] = strdup(item)) == NULL)
445: errx(1, "strdup");
446: ret[n] = NULL;
447: }
1.20 claudio 448: return (ret);
1.1 djm 449: }
450:
451: static void
1.20 claudio 452: stats_prepare(struct statctx *sc)
1.1 djm 453: {
1.20 claudio 454: sc->buf = ptb->dummybuf;
455: sc->buflen = ptb->dummybuf_len;
456:
457: if (ptb->kvars)
458: sc->tcp_tcbaddr = kfind_tcb(sc->fd);
459: if (clock_gettime_tv(CLOCK_MONOTONIC, &sc->t_start) == -1)
460: err(1, "clock_gettime_tv");
1.1 djm 461: sc->t_last = sc->t_start;
462:
463: }
464:
465: static void
1.20 claudio 466: tcp_stats_display(unsigned long long total_elapsed, long double mbps,
1.11 claudio 467: float bwperc, struct statctx *sc, struct inpcb *inpcb,
468: struct tcpcb *tcpcb, struct socket *sockb)
469: {
470: int j;
471:
472: printf("%12llu %14llu %12.3Lf %7.2f%% ", total_elapsed, sc->bytes,
473: mbps, bwperc);
474:
1.20 claudio 475: if (ptb->kvars != NULL) {
476: kupdate_stats(sc->tcp_tcbaddr, inpcb, tcpcb,
1.11 claudio 477: sockb);
1.1 djm 478:
1.20 claudio 479: for (j = 0; ptb->kvars[j] != NULL; j++) {
1.11 claudio 480: #define S(a) #a
481: #define P(b, v, f) \
1.20 claudio 482: if (strcmp(ptb->kvars[j], S(b.v)) == 0) { \
1.11 claudio 483: printf("%s"f, j > 0 ? "," : "", b->v); \
484: continue; \
485: }
486: P(inpcb, inp_flags, "0x%08x")
487: P(sockb, so_rcv.sb_cc, "%lu")
1.19 claudio 488: P(sockb, so_rcv.sb_wat, "%lu")
1.11 claudio 489: P(sockb, so_rcv.sb_hiwat, "%lu")
490: P(sockb, so_snd.sb_cc, "%lu")
1.19 claudio 491: P(sockb, so_snd.sb_wat, "%lu")
1.11 claudio 492: P(sockb, so_snd.sb_hiwat, "%lu")
493: P(tcpcb, snd_una, "%u")
494: P(tcpcb, snd_nxt, "%u")
495: P(tcpcb, snd_wl1, "%u")
496: P(tcpcb, snd_wl2, "%u")
497: P(tcpcb, snd_wnd, "%lu")
498: P(tcpcb, rcv_wnd, "%lu")
499: P(tcpcb, rcv_nxt, "%u")
500: P(tcpcb, rcv_adv, "%u")
501: P(tcpcb, snd_max, "%u")
502: P(tcpcb, snd_cwnd, "%lu")
503: P(tcpcb, snd_ssthresh, "%lu")
504: P(tcpcb, t_rcvtime, "%u")
505: P(tcpcb, t_rtttime, "%u")
506: P(tcpcb, t_rtseq, "%u")
507: P(tcpcb, t_srtt, "%hu")
508: P(tcpcb, t_rttvar, "%hu")
509: P(tcpcb, t_rttmin, "%hu")
510: P(tcpcb, max_sndwnd, "%lu")
511: P(tcpcb, snd_scale, "%u")
512: P(tcpcb, rcv_scale, "%u")
513: P(tcpcb, last_ack_sent, "%u")
1.19 claudio 514: P(tcpcb, rfbuf_cnt, "%u")
515: P(tcpcb, rfbuf_ts, "%u")
516: P(tcpcb, ts_recent_age, "%u")
517: P(tcpcb, ts_recent, "%u")
1.11 claudio 518: #undef S
1.1 djm 519: #undef P
520: }
521: }
522: printf("\n");
523: }
524:
525: static void
1.20 claudio 526: tcp_process_slice(int fd, short event, void *bula)
1.1 djm 527: {
1.11 claudio 528: unsigned long long total_elapsed, since_last;
529: long double mbps, slice_mbps = 0;
530: float bwperc;
1.20 claudio 531: struct statctx *sc;
1.11 claudio 532: struct timeval t_cur, t_diff;
533: struct inpcb inpcb;
534: struct tcpcb tcpcb;
535: struct socket sockb;
536:
1.20 claudio 537: TAILQ_FOREACH(sc, &sc_queue, entry) {
538: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
539: err(1, "clock_gettime_tv");
540: if (ptb->kvars != NULL) /* process kernel stats */
541: kupdate_stats(sc->tcp_tcbaddr, &inpcb, &tcpcb,
1.11 claudio 542: &sockb);
1.20 claudio 543:
1.11 claudio 544: timersub(&t_cur, &sc->t_start, &t_diff);
545: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
546: timersub(&t_cur, &sc->t_last, &t_diff);
547: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
548: bwperc = (sc->bytes * 100.0) / mainstats.slice_bytes;
549: mbps = (sc->bytes * 8) / (since_last * 1000.0);
550: slice_mbps += mbps;
551:
1.20 claudio 552: tcp_stats_display(total_elapsed, mbps, bwperc, sc,
1.11 claudio 553: &inpcb, &tcpcb, &sockb);
554:
555: sc->t_last = t_cur;
556: sc->bytes = 0;
557: }
1.1 djm 558:
1.11 claudio 559: /* process stats for this slice */
560: if (slice_mbps > mainstats.peak_mbps)
561: mainstats.peak_mbps = slice_mbps;
1.20 claudio 562: printf("Conn: %3d Mbps: %12.3Lf Peak Mbps: %12.3Lf Avg Mbps: %12.3Lf\n",
563: mainstats.nconns, slice_mbps, mainstats.peak_mbps,
564: slice_mbps / mainstats.nconns);
565: mainstats.slice_bytes = 0;
566:
567: set_slice_timer(mainstats.nconns > 0);
568: }
569:
570: static void
571: udp_process_slice(int fd, short event, void *v_sc)
572: {
573: struct statctx *sc = v_sc;
574: unsigned long long total_elapsed, since_last;
575: long double slice_mbps, pps;
576: struct timeval t_cur, t_diff;
577:
578: if (clock_gettime_tv(CLOCK_MONOTONIC, &t_cur) == -1)
579: err(1, "clock_gettime_tv");
580: /* Calculate pps */
581: timersub(&t_cur, &sc->t_start, &t_diff);
582: total_elapsed = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
583: timersub(&t_cur, &sc->t_last, &t_diff);
584: since_last = t_diff.tv_sec * 1000 + t_diff.tv_usec / 1000;
585: slice_mbps = (sc->bytes * 8) / (since_last * 1000.0);
586: pps = (sc->udp_slice_pkts * 1000) / since_last;
587: if (slice_mbps > mainstats.peak_mbps)
588: mainstats.peak_mbps = slice_mbps;
589: printf("Elapsed: %11llu Mbps: %11.3Lf Peak Mbps: %11.3Lf %s PPS: %10.3Lf\n",
590: total_elapsed, slice_mbps, mainstats.peak_mbps,
591: ptb->sflag ? "Rx" : "Tx", pps);
592:
593: /* Clean up this slice time */
594: sc->t_last = t_cur;
595: sc->bytes = 0;
596: sc->udp_slice_pkts = 0;
597: set_slice_timer(1);
1.11 claudio 598: }
1.1 djm 599:
1.20 claudio 600: static void
601: udp_server_handle_sc(int fd, short event, void *v_sc)
1.11 claudio 602: {
603: ssize_t n;
1.20 claudio 604: struct statctx *sc = v_sc;
1.1 djm 605:
1.11 claudio 606: again:
1.20 claudio 607: n = read(fd, ptb->dummybuf, ptb->dummybuf_len);
608: if (n == 0)
609: return;
610: else if (n == -1) {
1.11 claudio 611: if (errno == EINTR)
612: goto again;
613: else if (errno == EWOULDBLOCK)
1.20 claudio 614: return;
1.11 claudio 615: warn("fd %d read error", fd);
1.20 claudio 616: return;
617: }
1.11 claudio 618:
1.20 claudio 619: if (ptb->vflag >= 3)
620: fprintf(stderr, "read: %zd bytes\n", n);
621: /* If this was our first packet, start slice timer */
622: if (mainstats.peak_mbps == 0)
623: set_slice_timer(1);
624: /* Account packet */
625: sc->udp_slice_pkts++;
626: sc->bytes += n;
627: }
628:
629: static void
630: tcp_server_handle_sc(int fd, short event, void *v_sc)
631: {
632: struct statctx *sc = v_sc;
633: ssize_t n;
634:
635: again:
636: n = read(sc->fd, sc->buf, sc->buflen);
637: if (n == -1) {
638: if (errno == EINTR)
639: goto again;
640: else if (errno == EWOULDBLOCK)
641: return;
642: warn("fd %d read error", sc->fd);
643: return;
644: } else if (n == 0) {
645: if (ptb->vflag)
646: fprintf(stderr, "%8d closed by remote end\n", sc->fd);
1.23 sthen 647: event_del(&sc->ev);
1.20 claudio 648: close(sc->fd);
649: TAILQ_REMOVE(&sc_queue, sc, entry);
650: free(sc);
651: mainstats.nconns--;
652: set_slice_timer(mainstats.nconns > 0);
653: return;
1.1 djm 654: }
1.20 claudio 655: if (ptb->vflag >= 3)
1.11 claudio 656: fprintf(stderr, "read: %zd bytes\n", n);
1.20 claudio 657: sc->bytes += n;
658: mainstats.slice_bytes += n;
659: }
1.11 claudio 660:
1.20 claudio 661: static void
662: tcp_server_accept(int fd, short event, void *bula)
663: {
664: int sock, r;
665: struct statctx *sc;
666: struct sockaddr_storage ss;
667: socklen_t sslen;
668: char tmp[128];
669:
670: sslen = sizeof(ss);
671: again:
672: if ((sock = accept(fd, (struct sockaddr *)&ss, &sslen)) == -1) {
673: if (errno == EINTR)
674: goto again;
675: warn("accept");
676: return;
677: }
678: saddr_ntop((struct sockaddr *)&ss, sslen,
679: tmp, sizeof(tmp));
680: if ((r = fcntl(sock, F_GETFL, 0)) == -1)
681: err(1, "fcntl(F_GETFL)");
682: r |= O_NONBLOCK;
683: if (fcntl(sock, F_SETFL, r) == -1)
684: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.24 ! haesbaer 685: if (ptb->Tflag != -1 && ss.ss_family == AF_INET) {
! 686: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
! 687: &ptb->Tflag, sizeof(ptb->Tflag)))
! 688: err(1, "setsockopt IP_TOS");
! 689: }
! 690: if (ptb->Tflag != -1 && ss.ss_family == AF_INET6) {
! 691: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
! 692: &ptb->Tflag, sizeof(ptb->Tflag)))
! 693: err(1, "setsockopt IPV6_TCLASS");
! 694: }
1.20 claudio 695: /* Alloc client structure and register reading callback */
696: if ((sc = calloc(1, sizeof(*sc))) == NULL)
697: err(1, "calloc");
698: sc->fd = sock;
699: stats_prepare(sc);
700: event_set(&sc->ev, sc->fd, EV_READ | EV_PERSIST,
701: tcp_server_handle_sc, sc);
702: event_add(&sc->ev, NULL);
703: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
704: mainstats.nconns++;
705: set_slice_timer(mainstats.nconns > 0);
706: if (ptb->vflag)
707: warnx("Accepted connection from %s, fd = %d\n", tmp, sc->fd);
1.1 djm 708: }
709:
1.20 claudio 710: static void
711: server_init(struct addrinfo *aitop, struct statctx *udp_sc)
1.1 djm 712: {
713: char tmp[128];
1.11 claudio 714: int sock, on = 1;
1.1 djm 715: struct addrinfo *ai;
1.20 claudio 716: struct event *ev;
1.11 claudio 717: nfds_t lnfds;
1.1 djm 718:
1.20 claudio 719: if (setpgid(0, 0) == -1)
720: err(1, "setpgid");
721:
1.11 claudio 722: lnfds = 0;
1.1 djm 723: for (ai = aitop; ai != NULL; ai = ai->ai_next) {
724: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp, sizeof(tmp));
1.20 claudio 725: if (ptb->vflag)
726: fprintf(stderr, "Try to bind to %s\n", tmp);
1.1 djm 727: if ((sock = socket(ai->ai_family, ai->ai_socktype,
728: ai->ai_protocol)) == -1) {
729: if (ai->ai_next == NULL)
730: err(1, "socket");
1.20 claudio 731: if (ptb->vflag)
1.1 djm 732: warn("socket");
733: continue;
734: }
1.22 mikeb 735: if (ptb->Vflag) {
736: if (setsockopt(sock, SOL_SOCKET, SO_RTABLE,
737: &ptb->Vflag, sizeof(ptb->Vflag)) == -1) {
738: if (errno == ENOPROTOOPT)
739: warn("set rtable");
740: else
741: err(1, "setsockopt SO_RTABLE");
742: }
743: }
1.24 ! haesbaer 744: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
! 745: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
! 746: &ptb->Tflag, sizeof(ptb->Tflag)))
! 747: err(1, "setsockopt IP_TOS");
! 748: }
! 749: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
! 750: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
! 751: &ptb->Tflag, sizeof(ptb->Tflag)))
! 752: err(1, "setsockopt IPV6_TCLASS");
! 753: }
1.1 djm 754: if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR,
755: &on, sizeof(on)) == -1)
756: warn("reuse port");
757: if (bind(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
758: if (ai->ai_next == NULL)
759: err(1, "bind");
1.20 claudio 760: if (ptb->vflag)
1.1 djm 761: warn("bind");
762: close(sock);
763: continue;
764: }
1.20 claudio 765: if (ptb->Sflag) {
1.1 djm 766: if (setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
1.20 claudio 767: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
768: warn("set receive buffer size");
1.1 djm 769: }
1.20 claudio 770: if (TCP_MODE) {
771: if (listen(sock, 64) == -1) {
772: if (ai->ai_next == NULL)
773: err(1, "listen");
774: if (ptb->vflag)
775: warn("listen");
776: close(sock);
777: continue;
778: }
1.1 djm 779: }
1.20 claudio 780: if ((ev = calloc(1, sizeof(*ev))) == NULL)
781: err(1, "calloc");
782: if (UDP_MODE)
783: event_set(ev, sock, EV_READ | EV_PERSIST,
784: udp_server_handle_sc, udp_sc);
785: else
786: event_set(ev, sock, EV_READ | EV_PERSIST,
787: tcp_server_accept, NULL);
788: event_add(ev, NULL);
789: if (ptb->vflag >= 3)
790: fprintf(stderr, "bound to fd %d\n", sock);
1.11 claudio 791: lnfds++;
1.1 djm 792: }
793: freeaddrinfo(aitop);
1.11 claudio 794: if (lnfds == 0)
1.1 djm 795: errx(1, "No working listen addresses found");
1.11 claudio 796: }
797:
798: static void
1.20 claudio 799: client_handle_sc(int fd, short event, void *v_sc)
800: {
801: struct statctx *sc = v_sc;
802: ssize_t n;
1.1 djm 803:
1.20 claudio 804: again:
805: if ((n = write(sc->fd, sc->buf, sc->buflen)) == -1) {
806: if (errno == EINTR || errno == EAGAIN ||
807: (UDP_MODE && errno == ENOBUFS))
808: goto again;
809: err(1, "write");
1.11 claudio 810: }
1.20 claudio 811: if (TCP_MODE && n == 0) {
812: warnx("Remote end closed connection");
813: exit(1);
1.1 djm 814: }
1.20 claudio 815: if (ptb->vflag >= 3)
816: warnx("write: %zd bytes\n", n);
817: sc->bytes += n;
818: mainstats.slice_bytes += n;
819: if (UDP_MODE)
820: sc->udp_slice_pkts++;
1.1 djm 821: }
822:
1.20 claudio 823: static void
824: client_init(struct addrinfo *aitop, int nconn, struct statctx *udp_sc)
1.1 djm 825: {
1.20 claudio 826: struct statctx *sc;
827: struct addrinfo *ai;
1.14 claudio 828: char tmp[128];
829: int i, r, sock;
1.1 djm 830:
1.20 claudio 831: sc = udp_sc;
1.4 henning 832: for (i = 0; i < nconn; i++) {
833: for (sock = -1, ai = aitop; ai != NULL; ai = ai->ai_next) {
834: saddr_ntop(ai->ai_addr, ai->ai_addrlen, tmp,
835: sizeof(tmp));
1.20 claudio 836: if (ptb->vflag && i == 0)
1.4 henning 837: fprintf(stderr, "Trying %s\n", tmp);
838: if ((sock = socket(ai->ai_family, ai->ai_socktype,
839: ai->ai_protocol)) == -1) {
840: if (ai->ai_next == NULL)
841: err(1, "socket");
1.20 claudio 842: if (ptb->vflag)
1.4 henning 843: warn("socket");
844: continue;
845: }
1.24 ! haesbaer 846: if (ptb->Tflag != -1 && ai->ai_family == AF_INET) {
! 847: if (setsockopt(sock, IPPROTO_IP, IP_TOS,
! 848: &ptb->Tflag, sizeof(ptb->Tflag)))
! 849: err(1, "setsockopt IP_TOS");
! 850: }
! 851: if (ptb->Tflag != -1 && ai->ai_family == AF_INET6) {
! 852: if (setsockopt(sock, IPPROTO_IPV6, IPV6_TCLASS,
! 853: &ptb->Tflag, sizeof(ptb->Tflag)))
! 854: err(1, "setsockopt IPV6_TCLASS");
! 855: }
1.22 mikeb 856: if (ptb->Vflag) {
857: if (setsockopt(sock, SOL_SOCKET, SO_RTABLE,
858: &ptb->Vflag, sizeof(ptb->Vflag)) == -1) {
859: if (errno == ENOPROTOOPT)
860: warn("set rtable");
861: else
862: err(1, "setsockopt SO_RTABLE");
863: }
864: }
1.20 claudio 865: if (ptb->Sflag) {
1.4 henning 866: if (setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
1.20 claudio 867: &ptb->Sflag, sizeof(ptb->Sflag)) == -1)
1.4 henning 868: warn("set TCP send buffer size");
869: }
870: if (connect(sock, ai->ai_addr, ai->ai_addrlen) != 0) {
871: if (ai->ai_next == NULL)
872: err(1, "connect");
1.20 claudio 873: if (ptb->vflag)
1.4 henning 874: warn("connect");
875: close(sock);
876: sock = -1;
877: continue;
878: }
879: break;
1.1 djm 880: }
1.4 henning 881: if (sock == -1)
882: errx(1, "No host found");
883: if ((r = fcntl(sock, F_GETFL, 0)) == -1)
884: err(1, "fcntl(F_GETFL)");
885: r |= O_NONBLOCK;
886: if (fcntl(sock, F_SETFL, r) == -1)
887: err(1, "fcntl(F_SETFL, O_NONBLOCK)");
1.20 claudio 888: /* Alloc and prepare stats */
889: if (TCP_MODE) {
890: if ((sc = calloc(1, sizeof(*sc))) == NULL)
891: err(1, "calloc");
892: }
893: sc->fd = sock;
894: stats_prepare(sc);
895: event_set(&sc->ev, sc->fd, EV_WRITE | EV_PERSIST,
896: client_handle_sc, sc);
897: event_add(&sc->ev, NULL);
898: TAILQ_INSERT_TAIL(&sc_queue, sc, entry);
899: mainstats.nconns++;
900: set_slice_timer(mainstats.nconns > 0);
901: if (UDP_MODE)
902: break;
1.14 claudio 903: }
904: freeaddrinfo(aitop);
905:
1.20 claudio 906: if (ptb->vflag && nconn > 1)
1.14 claudio 907: fprintf(stderr, "%u connections established\n", nconn);
908: }
909:
1.24 ! haesbaer 910: static int
! 911: map_tos(char *s, int *val)
! 912: {
! 913: /* DiffServ Codepoints and other TOS mappings */
! 914: const struct toskeywords {
! 915: const char *keyword;
! 916: int val;
! 917: } *t, toskeywords[] = {
! 918: { "af11", IPTOS_DSCP_AF11 },
! 919: { "af12", IPTOS_DSCP_AF12 },
! 920: { "af13", IPTOS_DSCP_AF13 },
! 921: { "af21", IPTOS_DSCP_AF21 },
! 922: { "af22", IPTOS_DSCP_AF22 },
! 923: { "af23", IPTOS_DSCP_AF23 },
! 924: { "af31", IPTOS_DSCP_AF31 },
! 925: { "af32", IPTOS_DSCP_AF32 },
! 926: { "af33", IPTOS_DSCP_AF33 },
! 927: { "af41", IPTOS_DSCP_AF41 },
! 928: { "af42", IPTOS_DSCP_AF42 },
! 929: { "af43", IPTOS_DSCP_AF43 },
! 930: { "critical", IPTOS_PREC_CRITIC_ECP },
! 931: { "cs0", IPTOS_DSCP_CS0 },
! 932: { "cs1", IPTOS_DSCP_CS1 },
! 933: { "cs2", IPTOS_DSCP_CS2 },
! 934: { "cs3", IPTOS_DSCP_CS3 },
! 935: { "cs4", IPTOS_DSCP_CS4 },
! 936: { "cs5", IPTOS_DSCP_CS5 },
! 937: { "cs6", IPTOS_DSCP_CS6 },
! 938: { "cs7", IPTOS_DSCP_CS7 },
! 939: { "ef", IPTOS_DSCP_EF },
! 940: { "inetcontrol", IPTOS_PREC_INTERNETCONTROL },
! 941: { "lowdelay", IPTOS_LOWDELAY },
! 942: { "netcontrol", IPTOS_PREC_NETCONTROL },
! 943: { "reliability", IPTOS_RELIABILITY },
! 944: { "throughput", IPTOS_THROUGHPUT },
! 945: { NULL, -1 },
! 946: };
! 947:
! 948: for (t = toskeywords; t->keyword != NULL; t++) {
! 949: if (strcmp(s, t->keyword) == 0) {
! 950: *val = t->val;
! 951: return (1);
! 952: }
! 953: }
! 954:
! 955: return (0);
! 956: }
! 957:
1.1 djm 958: int
959: main(int argc, char **argv)
960: {
961: extern int optind;
962: extern char *optarg;
963:
964: char kerr[_POSIX2_LINE_MAX], *tmp;
1.11 claudio 965: struct addrinfo *aitop, hints;
1.1 djm 966: const char *errstr;
1.11 claudio 967: struct rlimit rl;
1.20 claudio 968: int ch, herr, nconn;
1.12 deraadt 969: struct nlist nl[] = { { "_tcbtable" }, { "" } };
1.1 djm 970: const char *host = NULL, *port = DEFAULT_PORT;
1.20 claudio 971: struct event ev_sigint, ev_sigterm, ev_sighup;
972: struct statctx *udp_sc = NULL;
1.1 djm 973:
1.20 claudio 974: /* Init world */
975: ptb = &tcpbench;
976: ptb->dummybuf_len = 0;
977: ptb->Sflag = ptb->sflag = ptb->vflag = ptb->Vflag = 0;
978: ptb->kvmh = NULL;
979: ptb->kvars = NULL;
980: ptb->rflag = DEFAULT_STATS_INTERVAL;
1.24 ! haesbaer 981: ptb->Tflag = -1;
1.20 claudio 982: nconn = 1;
1.1 djm 983:
1.24 ! haesbaer 984: while ((ch = getopt(argc, argv, "B:hlk:n:p:r:sS:T:uvV:")) != -1) {
1.1 djm 985: switch (ch) {
986: case 'l':
987: list_kvars();
988: exit(0);
989: case 'k':
990: if ((tmp = strdup(optarg)) == NULL)
991: errx(1, "strdup");
1.20 claudio 992: ptb->kvars = check_prepare_kvars(tmp);
1.1 djm 993: free(tmp);
994: break;
995: case 'r':
1.20 claudio 996: ptb->rflag = strtonum(optarg, 0, 60 * 60 * 24 * 1000,
1.1 djm 997: &errstr);
998: if (errstr != NULL)
999: errx(1, "statistics interval is %s: %s",
1000: errstr, optarg);
1001: break;
1002: case 'p':
1003: port = optarg;
1004: break;
1005: case 's':
1.20 claudio 1006: ptb->sflag = 1;
1.1 djm 1007: break;
1008: case 'S':
1.20 claudio 1009: ptb->Sflag = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1010: &errstr);
1011: if (errstr != NULL)
1012: errx(1, "receive space interval is %s: %s",
1013: errstr, optarg);
1014: break;
1015: case 'B':
1.20 claudio 1016: ptb->dummybuf_len = strtonum(optarg, 0, 1024*1024*1024,
1.1 djm 1017: &errstr);
1018: if (errstr != NULL)
1019: errx(1, "read/write buffer size is %s: %s",
1020: errstr, optarg);
1021: break;
1022: case 'v':
1.20 claudio 1023: ptb->vflag++;
1.9 claudio 1024: break;
1025: case 'V':
1.20 claudio 1026: ptb->Vflag = (unsigned int)strtonum(optarg, 0,
1.9 claudio 1027: RT_TABLEID_MAX, &errstr);
1028: if (errstr)
1.17 guenther 1029: errx(1, "rtable value is %s: %s",
1.9 claudio 1030: errstr, optarg);
1.1 djm 1031: break;
1.4 henning 1032: case 'n':
1033: nconn = strtonum(optarg, 0, 65535, &errstr);
1034: if (errstr != NULL)
1035: errx(1, "number of connections is %s: %s",
1036: errstr, optarg);
1037: break;
1.20 claudio 1038: case 'u':
1039: ptb->uflag = 1;
1.24 ! haesbaer 1040: break;
! 1041: case 'T':
! 1042: if (map_tos(optarg, &ptb->Tflag))
! 1043: break;
! 1044: errstr = NULL;
! 1045: if (strlen(optarg) > 1 && optarg[0] == '0' &&
! 1046: optarg[1] == 'x')
! 1047: ptb->Tflag = (int)strtol(optarg, NULL, 16);
! 1048: else
! 1049: ptb->Tflag = (int)strtonum(optarg, 0, 255,
! 1050: &errstr);
! 1051: if (ptb->Tflag == -1 || ptb->Tflag > 255 || errstr)
! 1052: errx(1, "illegal tos value %s", optarg);
1.20 claudio 1053: break;
1.1 djm 1054: case 'h':
1055: default:
1056: usage();
1057: }
1058: }
1059:
1060: argv += optind;
1061: argc -= optind;
1.20 claudio 1062: if ((argc != (ptb->sflag ? 0 : 1)) ||
1063: (UDP_MODE && (ptb->kvars || nconn != 1)))
1.1 djm 1064: usage();
1.4 henning 1065:
1.20 claudio 1066: if (!ptb->sflag)
1.1 djm 1067: host = argv[0];
1.20 claudio 1068: /*
1069: * Rationale,
1070: * If TCP, use a big buffer with big reads/writes.
1071: * If UDP, use a big buffer in server and a buffer the size of a
1072: * ethernet packet.
1073: */
1074: if (!ptb->dummybuf_len) {
1075: if (ptb->sflag || TCP_MODE)
1076: ptb->dummybuf_len = DEFAULT_BUF;
1077: else
1078: ptb->dummybuf_len = DEFAULT_UDP_PKT;
1079: }
1.1 djm 1080:
1.13 claudio 1081: bzero(&hints, sizeof(hints));
1.20 claudio 1082: if (UDP_MODE)
1083: hints.ai_socktype = SOCK_DGRAM;
1084: else
1085: hints.ai_socktype = SOCK_STREAM;
1086: if (ptb->sflag)
1.4 henning 1087: hints.ai_flags = AI_PASSIVE;
1.13 claudio 1088: if ((herr = getaddrinfo(host, port, &hints, &aitop)) != 0) {
1089: if (herr == EAI_SYSTEM)
1090: err(1, "getaddrinfo");
1091: else
1092: errx(1, "getaddrinfo: %s", gai_strerror(herr));
1.1 djm 1093: }
1.20 claudio 1094: if (ptb->kvars) {
1095: if ((ptb->kvmh = kvm_openfiles(NULL, NULL, NULL,
1.1 djm 1096: O_RDONLY, kerr)) == NULL)
1097: errx(1, "kvm_open: %s", kerr);
1098: drop_gid();
1.20 claudio 1099: if (kvm_nlist(ptb->kvmh, nl) < 0 || nl[0].n_type == 0)
1.1 djm 1100: errx(1, "kvm: no namelist");
1.20 claudio 1101: ptb->ktcbtab = nl[0].n_value;
1.1 djm 1102: } else
1103: drop_gid();
1104:
1.11 claudio 1105: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1106: err(1, "getrlimit");
1107: if (rl.rlim_cur < MAX_FD)
1108: rl.rlim_cur = MAX_FD;
1109: if (setrlimit(RLIMIT_NOFILE, &rl))
1110: err(1, "setrlimit");
1111: if (getrlimit(RLIMIT_NOFILE, &rl) == -1)
1112: err(1, "getrlimit");
1113:
1.20 claudio 1114: /* Init world */
1115: TAILQ_INIT(&sc_queue);
1116: if ((ptb->dummybuf = malloc(ptb->dummybuf_len)) == NULL)
1117: err(1, "malloc");
1118: arc4random_buf(ptb->dummybuf, ptb->dummybuf_len);
1119:
1120: if (UDP_MODE) {
1121: if ((udp_sc = calloc(1, sizeof(*udp_sc))) == NULL)
1122: err(1, "calloc");
1123: udp_sc->fd = -1;
1124: stats_prepare(udp_sc);
1125: }
1126:
1127: /* Setup libevent and signals */
1128: event_init();
1129: signal_set(&ev_sigterm, SIGTERM, signal_handler, NULL);
1130: signal_set(&ev_sighup, SIGHUP, signal_handler, NULL);
1131: signal_set(&ev_sigint, SIGINT, signal_handler, NULL);
1132: signal_add(&ev_sigint, NULL);
1133: signal_add(&ev_sigterm, NULL);
1134: signal_add(&ev_sighup, NULL);
1135: signal(SIGPIPE, SIG_IGN);
1136:
1137: if (TCP_MODE)
1138: print_tcp_header();
1139:
1140: if (UDP_MODE)
1141: evtimer_set(&mainstats.timer, udp_process_slice, udp_sc);
1.1 djm 1142: else
1.20 claudio 1143: evtimer_set(&mainstats.timer, tcp_process_slice, NULL);
1144:
1145: if (ptb->sflag) {
1146: server_init(aitop, udp_sc);
1147: } else
1148: client_init(aitop, nconn, udp_sc);
1149:
1150: /* libevent main loop*/
1151: event_dispatch();
1.1 djm 1152:
1.20 claudio 1153: return (0);
1.1 djm 1154: }